Sciweavers

8177 search results - page 90 / 1636
» Detecting System Emulators
Sort
View
CNSR
2006
IEEE
139views Communications» more  CNSR 2006»
14 years 4 months ago
Genetic Programming Based WiFi Data Link Layer Attack Detection
This paper presents a genetic programming based detection system for Data Link layer attacks on a WiFi network. We explore the use of two different fitness functions in order to ...
Patrick LaRoche, A. Nur Zincir-Heywood
BMVC
2000
13 years 11 months ago
Morphological Change Detection Algorithms for Surveillance Applications
Vision-based systems for remote surveillance usually involve change detection algorithms for intruders, obstacles or irregularities detection. In particular, there is a potentiall...
Elena Stringa
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
14 years 4 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
IJCNN
2000
IEEE
14 years 2 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
ICASSP
2011
IEEE
13 years 1 months ago
Smart grid monitoring for intrusion and fault detection with new locally optimum testing procedures
The vulnerability of smart grid systems is a growing concern. Signal detection theory is employed here to detect a change in the system. We employ a discrete-time linear state spa...
Qian He, Rick S. Blum